Dept. of Computer Science M.SC. (CSC) 2013-2014
KAKATIYA UNIVERSITY WARANGAL
DEPARTMENT OF COMPUTER SCIENCE
COURSE STRUCTURE FOR M.SC. (CSC) WITH EFFECT FROM 2013-14
M.SC. I YEAR I SEMESTER:
Paper No Paper Title/Subject Workload Per Week
(Theory : Lab)
Marks
Internal
External
Total
MSCCS111 DISCRETE MATHEMATICS T(04) 20 80 100
MSCCS112 COMPUTER ORGANIZATION T(04) 20 80 100
MSCCS113 OOPS WITH JAVA T(04) 20 80 100
MSCCS114 OPERATING SYSTEMS T(04) 20 80 100
MSCCS115 COMPUTER NETWORKS T(04) 20 80 100
MSCCS116 OOPS LABORATORY L(04) -- 50 50
MSCCS117 COMPUTER NETWORK S
LABORATORY L(04) -- 50 50
MSCCS118 OPERATING SYSTEM
LABORATORY L(04) -- 50 50
650
Dept. of Computer Science M.SC. (CSC) 2013-2014
MSCCS111 DISCRETE MATHEMATICS DM
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
U N I T - I
FUNDAMENTALS: Sets, Relations and functions, Fundamental of logic, Logical inferences, First order logic, Quantified propositions, Mathematical induction
ELEMENTARY COMBINATORICS: Combinations and Permutations, Enumeration- with Repetitions, with constrained repetitions, The Principle of Inclusion-Exclusion.(Chapters 1-2)
U N I T -II
RECURRENCE RELATIONS: Generating functions, Coefficients of Generating functions,
Recurrence Relations, Inhomogeneous Recurrence Relations (Chapter-3)
U N I T - III
RELATIONS AND DIAGRAMS: Relations and diagrams, Binary relations, Equivalence
relations, Ordering relations, Lattices, Paths and Closures, Directed graphs, Adjacency
matrices-Applications, Sorting and Searching (Chapter - 4)
U N I T - IV
GRAPHS: Graphs, Isomorphism, Trees, Spanning trees, Binary trees, Planar graphs,
Euler’sCircuits, Hamiltonian graphs, Chromatic numbers, Four-color problem, Network
flows (Chapter 5)
TEXT-BOOK:
1. DISCRETE MATHEMATICS FOR COMPUTER SCIENTISTS, BY - J L MOTT, A KANDEL
AND T PBAKER
REFERENCE BOOKS:
1. DISCRETE MATHEMATICAL STRUCTURE - (TMH) BY - TREMBLEY AND MANOHAR
2. DISCRETE MATHEMATICS WITH ALGORITHMS - (JOHN WILEY) BY - M.O. ALBERTSON
AND J.P.HUTCHINSON
3. ELEMENTS OF DISCRETE MATHEMATICS-(TMH, SECOND EDITION) BY - C.L.LIU
4. DISCRETE MATHEMATICS - (PHI, THIRD EDITION) BY - BURNORD KOLMAN
5. DISCRETE MATHEMATICS BY KH ROSSEN (TMH)
6. DISCRETE MATHEMATICS BY S LIPSCHUTZ AND M. LIPSON SCHAUM’S SERIES (TMH)
7. DISCRETE MATHEMATICS FOR COMPUTER SCIENCE BY GARRRY HAGGARD, J.
Dept. of Computer Science M.SC. (CSC) 2013-2014
SCHILPF AND S WHITE SIDES (THOMSON PRESS)
8. DISCRETE &COMBINATORIAL MATHEMATICS BY RALPH P GRIMALDI(PEARSON EDUCATION) 9. DISCRETE MATHEMATICAL STRUCTURES BY DS MALLIK & M K SEN (THOMSON PRESS)
MSCCS112 COMPUTER ORGANIZATION CO
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
U N I T - I BASIC STRUCTURE OF COMPUTER HARDWARE AND SOFTWARE: Functional units, Basic operational concepts, Bus structures, Software, Performance, Distributed Computing. LOGIC CIRCUITS: Basic Logic Functions, Synthesis of Logic Functions Using ADN, OR, and NOT Gates, Minimization of Logic Expression, Synthesis with NAND and NOR Gates, Practical Implementation of Logic Gates, Flip-Flops, Registers and Shift Registers, Counters, Decoders, Multiplexers, Sequential Circuits. (Chapter 1, A.1 to A.13) UN I T - II ADDRESSING METHODS: Basic Concepts, Memory Locations, Main Memory Operations,
Addressing Modes, Assembly Language, Basic I/O operations, Stacks and Queues,
Subroutines. PROCESSING UNIT: Some Fundamental Concepts, Execution of a Complete
Instruction, Hardwired Control, Performance Considerations, Micro Programmed Control,
Signed Addition and Subtraction, Arithmetic and Branching Conditions, Multiplication of
Positive Numbers, Signed-Operand, Integer Division, Floating-Point Numbers.(Chapter 2.1 to
2.83, 6.4 to 6.10)
U N I T - III INPUT-OUTPUT ORGANIZATION: Accessing I/O Devices, Interrupts, Processor Examples, Direct Memory Access, I/O Hardware, Standard I/O Interfaces, The Motorola 680X0 Family, The Intel 80X86 Family, The Power PC Family, The Alpha AXP Family, Architectural and Performance Comparisons, A Stack Processor. (Chapter 4, 8.1 to 8.6) U N I T - IV MEMORY: Semiconductor RAM memories, Read-Only Memories, Cache Memories, Performance Considerations, Virtual Memories, Memory Management Requirements. INTRODUCTION TO COMPUTER PERIPHERALS: I/O Devices, On-Line Storage. (Chapter 5, 9.1, 9.2)
Dept. of Computer Science M.SC. (CSC) 2013-2014
TEXT BOOK:
1. COMPUTER ORGANIZATION, TMH (IV EDITION) BY - V.C. HAMACHER
REFERENCES:
1. COMPUTER ORGANIZATION, (PHI) BY - MORIS MANO 2. COMPUTER ARCHITECTURE & ORGANISATIONBY - HAYES, (TMH) 3. 3. COMPUTER SYSTEMS ORGANISATION& ARCHITECTURE BY -CARPINELLI,
(ADDISON WESLEY) 4. THE ARCHITECTURE OF COMPUTER HANDWONE AND SYTEMS HANDWONE BY- I
ENGLANDER (WILEY) 5. COMPUTER SYTEMS DESIGN AND ARCHITECTURE BY - VP HEURING, HF JORDAN
(PEARSON) 6. COMPUTER ORGANIZATION & ARCHITECTURES BY - STALLINGS (PEARSON, PHI) 7. COMPUTER ORGANIZATION & DESIGN BY - PP CHAUDARI (PHI)
MSCCS113 OOPS WITH JAVA OOPS
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
UNIT - I
Object - Oriented Thinking: Messages and Methods - Classes and Instances - Class Hierarchies
-Inheritance - Method Binding, Overriding, and Exceptions. A Brief History of Object - Oriented
Programming: The History of Java - Client - Side Computing - Java Language Description.
Object - Oriented Design: RDD - CRC cards - Components and Behavior - Software
Components-Formalizing the Interface – Implementing components Integration of Components.
Understanding Paradigms: Program Structure - Types - Access Modifiers - Lifetime
Modifiers. (Chapters1 to 4) UNIT - II Data Fields - Constructors - Inheritance - The Java Graphics Model - Multiple Objects of the Same Class. Adding User Interaction - Inner Classes - Interfaces - The Java Event Model - Window Layout. Understanding Inheritance: An Intuitive Description of Inheritance - Subclass, Subtype, and Substitutability - Forms of Inheritance - Modifiers and Inheritance - The Benefits of Inheritance -The Costs of Inheritance. Mechanisms for Software Reuse: Substitutability-Combining Inheritance and Composition - Dynamic Composition. (Chapters 5, 6, 8, 10)
UNIT - III
Implications of Inheritance: The Polymorphic Variable - Assignment - Equality Test -
Garbage Collection. Polymorphism: Polymorphic Variables - Overloading - Overriding -
Abstract methods - Pure Polymorphism. Input and Output Streams: Input Streams - Output
Streams - Object serialization - Piped Input and Output - Readers and Writers. Exception
Handling: Information Transmitted to the Catch Block - The Finally Clause - Throwing
Exceptions - Passing on Exceptions. (Chapters 11, 12,14,16)
UNIT - IV
The AWT: The AWT Class Hierarchy - User Interface Components – Panels Dialogs. Understanding Graphics: Color - Rectangles - Fonts - Images. Multiple Threads of Execution: Creating Threads - synchronizing Threads. Collection Classes - Multiple Threads of Execution -
Dept. of Computer Science M.SC. (CSC) 2013-2014
Exception Handling. Applets and Web Programming: Applets and HTML - Security Issues - Applets and Applications -Obtaining Resources Using an Applet - Combining Applications and Applets. (Chapters 7, 13, 18, 20, 21)
TEXT BOOK:
1. UNDERSTANDING OBJECT-ORIENTED PROGRAMMING WITH JAVA BY – TIMOTHY BUDD (PEARSON)
REFERENCE BOOKS:
1. THE COMPLETE REFERENCE JAVA 2 (Fourth Edition) BY - PATRICK NAUGHTON & HERBETSCHILDT (TMH)
2. PROGRAMMING JAVA - DECKER&HIRSH FIELD VIKAS PUBLISKING(2001) (THOMSON LEARNING) (SECOND EDITON)
3. INTRODUCTION TO JAVA PROGRAMMING - Y.DANIEL LIANG PHI (2002) 4. OBJECT ORIENTED PROGRAMMING THROUGH JAVA 2 BY - THAMUS WU (Mc.GrawHill) 5. JAVA 2 - DIETEL & DIETEL (PEARSON EDUCATION) 6. INTRODUCTION TO JAVA - BALA GURU SWAMY 7. INTRODUCTION TO PROGRAMMIND & OOD USING JAVA - JAINO NINE & FA HOSCH
(JOHNWILEY) 8. STARTING OUT WITH JAVA - JONY GADDIS (DREAM TECH PRESS) 9. JAVA PROGRAMMING - SCHAUM’S SERIES 10. OBJECT ORIENTED APPLICATION DEVELOPMENT USING JAVA - ER DOXE ETC.
(THOMSONPRESS) 11. THINKING IN JAVA -BY - BRUCE ECKEL (PEARSON) 12. PROGRAMMING & PROBLEM SOLVING WITH JAVA - JM SLACK (THOMSON) 13. COMPUTING CONCEPTS WITH JAVA2 ESSENTIALS - CAY HORSTMANN (JOHNWILEY) 14. JAVA PROGRAMMING ADVANCED TOPICS - J WIGGLESWORTH, P LUMBY MSCCS114
MSCCS114 OPERATING SYSTEMS
OS
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
UNIT - I
Computer System Overview - The Memory Hierarchy - I/O Communication Techniques.
Operating System Overview - The Evolution of Operating Systems - Microsoft Windows Overview - Modern UNIX Systems - Linux. Process Description and Control - Process States - Process Description - Process Control - UNIX SVR 4 Process management. Threads, SMP, and Micro kernels – Processes and Threads - symmetric Multiprocessing - Micro Kernels. (Chapters1to 4)
UNIT - II
CONCURRENCY: Mutual Exclusion and Synchronization - Principles of Concurrency -
Mutual Exclusion : Hardware Support - Semaphores - Monitors - Message Passing - Readers
/ Writers problem. Concurrency: Deadlock and Starvation - Principles of Deadlock - Deadlock
Prevention - Deadlock Avoidance - Deadlock Detection - Dining Philosophers Problem - UNIX
Concurrency Mechanisms. (Chapters 5, 6)
UNIT - III
Memory Management - memory management Requirements - Memory Partitioning- Paging -
Segmentation. Virtual Memory - Hardware and Control Structures - Operating System Software. Uniprocessor Scheduling - Types of Processor Scheduling - Scheduling Algorithms -
Dept. of Computer Science M.SC. (CSC) 2013-2014
Traditional UNIX Scheduling. (Chapters 7, 8, 9) UNIT - IV
I/O Management and Disk Scheduling - I/O Devices - Organization of the I/O Function
-Operating System Design Issues - Disk Scheduling - Disk Cache.
File Management - File Organization and Access - File Directories - File Sharing - record Blocking - Secondary Storage Management - UNIX File Management. (Chapter 11, 12)
TEXT BOOK:
1. OPERATING SYSTEMS - BY - WILLIAM STALLINGS (V Edition)
REFERENCE BOOKS:
1. 1.OPERATING SYSTEMS A MODERM PERSPECTIVE (Second Edition)BY - GARY NUTT (PEARSON)
2. APPLIED OPERATING SYSTEM BY - SILER SCHATZ, GALVIN (JOHN WILEY) 3. MODERN OPERATING SYSTEM BY - TANANBAM (PHI) 4. OPERATING SYSTEM PRINCIPLES BY - SILBERSCHATZ, GALIVN GAGNE (JOHN
WILEY) 5. OPERATING SYSTEMS BY - DM DHAMDHERE (TMH) 6. UNDER STANDING OPERATING SYSTEMS BY - IM FLYNN, AM MCHOCS
(THOMSONPRESS) 7. OPERATING SYTEMS - DIETEL (PEARSON) 8. OPERATING SYSTEMS - RC JOSHI, S. TAPASWI (DREAM TECH)
MSCCS115 COMPUTER NETWORKS
CN
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
U N I T - I
COMPUTER NETWORKS AND THE INTERNET: What is the Internet?, What is a Protocol?,
The Network Edge, The Network Core, Access Networks and Physical Media, Delay and
Loss in Packet-Switched Networks, Protocol Layers and Their Service Models, Internet
Backbones, NAPs, and ISPs, A Brief History of Computer Networking and the Internet.
APPLICATION LAYER: Principles of Application Layer Protocols, The World Wide Web: HTTP,
File Transfer: FTP, Electronic Mail in the Internet, DNS - The Internet's Directory
Service. (Chapter 1 and Chapter 2.1 to 2.5)
U N I T - II
TRANSPORT LAYER: Transport-Layer Services and Principles, Multiplexing and DE
multiplexing Applications, Connectionless Transport: UDP, Principles of Reliable Data
Transfer, Connection-Oriented Transport: TCP, Principles of Congestion Control. (Chapter 3.1
to 3.6)
Dept. of Computer Science M.SC. (CSC) 2013-2014
U N I T - III
NETWORK LAYER AND ROUTING: Introduction and Network Service Models,
Routing Principles, Hierarchical Routing, Inter Protocol, Routing in the Internet, What’s Inside a
Router? (Chapter 4.1 to 4.6)
U N I T - IV
LINK LAYER AND LOCAL AREA NETWORKS: The Data Link Layer: Introduction, Services,
Error Detection and Correction Techniques, Multiple Access Protocols and LAN's, LAN
Addresses and ARP, Ethernet, Hubs, Bridges, and Switches, IEEE 802.11 LANs, PPP: The
Point-to-Point Protocol, Asynchronous Transfer Mode (ATM), X.25 and Frame Relay. (Chapter
5.1 to 5.10)
TEXT BOOK:
1. COMPUTER NETWORKING A TOP-DOWN APPROACH FEATURING THE INTERNET BY -
JAMES F. KUROSE AND KEITH W. ROSS (PEARSON)
REFERENCE BOOKS:
1. BUSINESS DATA COMMUNICATION & NETWORKS By - FITZ GERALD (John Wiley)
2. DATA & COMPUTER COMMUNICATIONS - W STALLINGS (PEARSON, PHI)
3. COMPUTER COMMUNICATIONS&NETWORKING TOPOLOGIES-MAGALLO, V.M.HANCOCK (THOMSON)
4. DATA COMMUNICATION & COMPUTER NETWORKS - R. AGARWAL, BB TIWARI (VIKAS)
5. COMPUTER NETWORKS - AS TANENBAUM (PHI)
6. COMPUTER NETWORKS - BLACK (PHI)
7. UNDER STANDING COMMUNICATIONS & NETWORKS - WA SHAY (THOMSON)
MSCCS116
OOPS LAB OOPSL
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
1. Write a Java Program for sorting a given list of names in ascending order using command line arguments.
2. Write a Java Program to multiply two given matrices. 3. Programs Illustrating Overloading & Overriding methods in Java. 4. Programs Illustrating the Implementation of Various forms of
Inheritance. (Ex. Single, Hierarchical, Multilevel inheritance….) 5. Program which illustrates the implementation of multiple Inheritance using interfaces
in Java.
Dept. of Computer Science M.SC. (CSC) 2013-2014
6. Program illustrates the implementation of abstract class. 7. Programs to create packages in Java. 8. Program to Create Multiple Threads in Java. 9. Program to Implement Producer/Consumer problem using synchronization. 10. Program to Write Applets to draw the various polygons. 11. Create and Manipulate Labels, Lists, Text Fields, Text Areas & Panels 12. Handling Mouse Events & Keyboard Events. 13. Using Layout Managers. 14. Create & Manipulate the Following Text Areas, Canvas, Scroll bars, Frames, Menus,
Dialog Boxes. 15. Programs which illustrate the manipulation of strings.
Ex. 1 Sorting an array of Strings.
16. Frequency count of words & Characters in a text. 17. Programs which illustrates the use of files & Streams. 18. Java Program that reads on file name from the user and displays the contents of file. 19. Java Program that displays the no. of characters, lines & words in a text file. 20. Java Program to display the contents of file along with a line number before each line. 21. Java Program to read & write the data using Random Access File.
TEXT BOOK:
1. THE COMPLETE REFERENCE JAVA J2SE 5TH EDITION BY - HERBERT SCHILDT (TMH)
MSCCS117
NET WORK AND ASSEMBLY PROGRAMMING LAB NAPL
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
NETWORKS LABORATORY
Dept. of Computer Science M.SC. (CSC) 2013-2014
PART A – Simulation Exercises The following experiments shall be conducted using either NS228/OPNET or any other simulators.
1. Simulate a three nodes point-to-point network with duplex links between them. Set the queue size vary the bandwidth and find the number of packets dropped. 2. Simulate a four node point-to-point network, and connect the links as follows: n0-n2, n1-n2 and n2-n3. Apply TCP agent between n0-n3 and UDP n1-n3. Apply relevant applications over TCP and UDP agents changing the parameter and determine the number of packets by TCP/UDP. 3. Simulate the different types of Internet traffic such as FTP a TELNET over a network and analyze the throughput. 4. Simulate the transmission of ping messaged over a network topology consisting of 6 nodes and find the number of packets dropped due to congestion. 5. Simulate an Ethernet LAN using N-nodes(6-10), change error rate and data rate and compare the throughput.
6. Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and determine collision across different nodes. 7. Simulate an Ethernet LAN using N nodes and set multiple traffic nodes and plot congestion window for different source/destination. 8. Simulate simple ESS and with transmitting nodes in wire-less LAN by simulation and determine the performance with respect to transmission of packets.
Dept. of Computer Science M.SC. (CSC) 2013-2014
MSCCS118 OPERATING SYSTEMS LAB
OSL
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
1. Simulate the following CPU Scheduling algorithms
a) Round Robin
b) SJF
c) FCFS
d) Priority
2. Simulate all file allocation strategies.
a) Sequential
b) Indexed
c) Linked
3. Simulate MVT and MFT
4. Simulate all File organization techniques. a) Single level directory
b) Two level
c) Hierarchical
d) DAG
5. Simulate Bankers Algorithm for Dead Lock Avoidance
6. Simulate Bankers Algorithm Dead Lock Prevention.
7. Simulate all Page replacement algorithms.
a) FIFO
b) LRU
c) LFU
d) Etc….
8. Simulate Paging Techniques of memory management.
9. Shell Programming.
a) Writing Simple shell scripts
b) Control structures - sequence, selection, iteration
c) Pipes & Redirections
d) Passing arguments to shell programs
e) Simple programs using system calls
10. UNIX System Administration: a) User account maintenance
b) Security
c) Print jobs
d) Backup
e) Package installations
f) Resource management
g) Device drivers
Dept. of Computer Science M.SC. (CSC) 2013-2014
KAKATIYA UNIVERSITY WARANGAL
DEPARTMENT OF COMPUTER SCIENCE
COURSE STRUCTURE FOR M.SC. (CSC) WITH EFFECT FROM 2013-14
M.SC. I YEAR II SEMESTER:
Paper No Paper Title/Subject Workload Per Week (Theory :
Lab)
Marks
Internal
External
Total
MSCCS121 INTERNET TECHNOLOGIES T(04) 20 80 100
MSCCS122 AUTOMATA THEORY AND FINITE LANGUAGES
T(04) 20 80 100
MSCCS123 UNIX NETWORK PROGRAMING
T(04) 20 80 100
MSCCS124 SYSTEM SOFTWARE T(04) 20 80 100
MSCCS125 WEB TECHNOLOGIES T(04) 20 80 100
MSCCS126 WEB TECHNOLOGIES
LABORATORY
L(04) -- 50 50
MSCCS127 UNIX PROGRAMING LABORATORY
L(04) -- 50 50
MSCCS128 INTERNET TECHNOLOGY LABORATORY
L(04) -- 50 50
650
Dept. of Computer Science M.SC. (CSC) 2013-2014
UNIT - I
HTML- Basic HML, The document body, Text, Hyperlinks, Adding More Formatting, Lists, Using
Color and Images, Images, Tables, Frames, Forms-Toward Interactivity . Cascading Stylesheets -
Introduction, Inline Styles, Embedded Style Sheets, Linking external sheets, Backgrounds, text
flow and box model. (Text Book 1 chapters 4, 5 and 6)
UNIT - II
JavaScript- Introduction, simple programming, Obtaining User Input with prompt Dialogs,
Operators (arithmetic, Decision making, assignment, logical, increment and decrement). Control
Structures - if… else selection statement, while, do… while repetitions statement, for statement,
switch statement, break and continue statements. Functions - program modules in JavaScript,
programmer defined functions, function definition, Random-number generator, scope rules, global
functions, recursion, JavaScript: Arrays. (Text Book 1 chapters 7, 8, 9 and 10)
UNIT - III
JavaScript: Objects - Math Object, String Object, Date Object, Boolean & Number Object,
document and window Objects. Event Model - on click, on load, on error, onmouseover,
onmouseout, on focus, on blur, on submit, on reset, more DHTML events. Filter and Transitions -
flipv, fliph, Chroma, masks, invert, gray, x-ray, shadow to text, alpha, glow, wave, drop shadow,
light, blend Trans, reveal Trans. (Text Book 1 chapters 11, 12, 14 and 15)
UNIT - IV
Introduction, XML Basics, Structuring Data, XML Namespaces, Document Type Definitions (DTDs),
W3C XML Schema Documents, XML Vocabularies, Math, Other Markup Languages, and
Extensible Style sheet Language and XSL Transformations, Document Object Model (DOM).
(PHP from Text Book 2 chapters 7, XML from Text Book 1 chapter No. 20)
TextBook:
1. Internet& World Wide Web- H. M. Deitel, P.J. Deitel, A. B. Goldberg-Third Edition
MSCCS121 INTERNET TECHNOLOGIES IT
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
MSCCS122 AUTOMATA THEORY AND FORMAL LANGUAGES AFL
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
NOTE: One of the bits in each question should be a problem.
U N I T - I
FINITE AUTOMATA AND REGULAR EXPRESSIONS : Preliminaries, Finite state systems, Nondeterministic finite automata (NFA), Deterministic finite automata (DFA), NFA TO DFA conversion Regular expressions, interconversions, Two-way finite automata, finite automata with output, State minimization applications. PROPERTIES OF REGULAR SETS:
Pumping Lemma, closure properties of regular sets. (Chapters 1, 2, 3.1 and 3.2) U N I T - II
CONTEXT FREE GRAMMARS (CFG): Context free grammars Derivation tree, simplification of
context - Free grammars, Normal forms. PUSHDOWN AUTOMATA: Informal description, Definitions, pushdown automata design. (Chapters 4.1 to 4.6, 5)
U N I T - III
PROPERTIES OF CONTEXT FREE LANGUAGES (CFL): Pumping Lemma, closure
properties, decision algorithms for CFLs. TURING MACHINES (TM): The turning machine &
model, computable languages and functions, design of TM, modification of TM, Church's hypothesis. (Chapters 6, 7)
U N I T - IV
RECURSIVE & RECURSIVELY INNUMERABLE LANGUAGES: UNDECIDABILITY: Properties
of recursive and recursively innumerable languages, Universal turing machine, post
correspondence problem. Decidable and Undecidable problems, universal turing machine,
Rice's theorem.THE CHOMSKY HIERARCHY: Regular grammars, Unrestricted grammars,
interconversions between regular grammars and finite automata, context - sensitive
languages, (Chapters 8.1 to 8.8, 9)
TEXT BOOK:
1.INTRODUCTION TO AUTOMATA THEORY LANGUAGES AND COMPUTATION By - J.E. HOPCROFT, J.D. ULLMAN (Narosa) Note: For Examples refer the book. Introduction to computer Theory - DIA Cohen (John Wiley) REFERENCE BOOKS:
1.INTRODUCTION TO COMPUTER THEORY-DAVIEL I.A.COHEN (John wiley, IInd Edition) 2.INTRODUCTION TO LANGUAGES AND THEORY OF COMPUTATION By - JOHN C. MARTIN (Second Edition TMH) 3. THEORY OF COMPUTATION By - CHANDRA SEKHARAN & MISRA (PHI) 4.INTRODUCTION TO AUTOMATA THOERY, LANGUAGES & COMPUTATION - JE HOPFCROFT, R. MOTWANI, JD ULLMAN (PEARSON) 5.THE THEORY OF COMPUTATION BERNARD M MORET (PEARSON) 6.INTRODUCTION TO THEORY OF COMPUTATION - M SIPSER (THOMSON) 7.INTRODUCTION TO THEORY OF COMPUTER SCIENCE - EV KRISHNA MURTHY (EWP) 8.AN INTRODUCTION TO FORMAL LANGUAGES & AUTOMATA - PETER LINZ (NAROSA) 9.AUTOMATA & COMPULABILITY - DC KOZEN (SPINGER) 10.THOERY OF COMPUATATION - SK AZAD (DHANPAT RAI & CO)
Dept. of Computer Science M.SC. (CSC) 2013-2014
MSCCS123 UNIX NETWORK PROGRAMMING UNP
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
U N I T - I
Inter-process Communication: Introduction, File and Record Locking, Simple Client-
server Pipes, FIFO's, Streams and Messages, Name Spaces, System V IPC, Message Queues, Semaphores, Shared Memory, Socket and TLI. (Chapters 3, 3.1 to 3.12)
U N I T - II
A Network Primer Communication Protocols: Introduction, TCP/IP, XNS, SNA, NetBIOS, OSI Protocol, UUCP, Protocols Comparisons. (Chapters 4, 5, 5.1 to 5.8)
U N I T - III
Berkeley Sockets: Introduction, Overview, Unix Domain Protocols, Socket Addresses,
Elementary Socket System Calls, Simple Examples, Advanced Socket System Calls,
Reserved Ports, Stream Pipes, Passing File Descriptors, Socket Options, Asynchronous I/O,
Input / Output Multiplexing, Out-of-Band and Data, Sockets and Signals, Internet Superserver, Socket Implementation. (Chapters 6, 6.1 to 6.17)
U N I T - IV
Transport, Overview, Transport Endpoint Addresses, Elementary TLI Functions,
Simple
Example, Advanced TLI Functions, Streams, TLI Implementation, Stream Pipes, Passing
File
Descriptors, Input/output Multiplexing, Asynchronous I/O, Out-of-Band Data. (Chapter 7.1 to 7.13)
TEXT BOOK:
1.UNIX NETWORK PROGRAMMING BY W. RICHARD STEVENS
REFERENCE BOOKS:
1.UNIX SYSTEMS PROGRAMMING - K.A. ROBBINS, S. ROBBINS (PEARSON)
2.UNIX THE C ODYSSEY - M. GANDHI, SHETTI, SHAH (BPB PUBLICATIONS)
Dept. of Computer Science M.SC. (CSC) 2013-2014
MSCCS124 SYSTEM SOFTWARE SS
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
U N I T – I
SYSTEMS PROGRAMMING: Assemblers Overview – Global Structure, .Stack Segment, .Data Segment, .Code Segment, Arithmetic – Addition, Subtraction, Multiplication, Division, Comments. Comparing and Branching – Decision making in Assembly, Unsigned Conditional jumps, Flags, Loops, Reading single characters, Sub programs-procedures, Macros – Declarations, Expansion, Parameters, Local Symbols, Parameter Separator, Assembly Listing.
(Chapters 2,4,5,6,7,8 text book2)
U N I T – II
BACKGROUND: Introduction, System Software and Machine Architecture, The Simplified Instructional Computer (SIC), SIC Machine Architecture, SIC/XE Machine Architecture, Traditional (CISC) Machines, VAX Architecture, Pentium Pro Architecture, RISC Machines.ASSEMBLERS: Basic Assembler Functions, A Simple SIC Assembler, Assembler Algorithm and Data Structures, Machine-Dependent Assembler Features, Instruction Formats and Addressing Modes, Program Relocation, Machine-independent Assembler Feature, Literals, Symbol-Defining Statements, Expressions, Program Blocks, Control Sections and Program Linking, Assemblers Design Options, One-Pass Assemblers, Multi-Pass Assemblers, (Chapters 1, 2 of text book1)
U N I T – III
LOADERS AND LINKERS: Basic Loader Functions, Design of an Absolute Loader, A Simple Bootstrap Loader, Machine-Dependent Loader Features, Relocation, Program Linking, Algorithm and Data Structures for a Linking Loader, Machine-Independent Loader Features, Automatic Library Search, Loader Options, Loader Design Options, Linkage Editors, Dynamic Linking, Bootstrap Loaders,MACRO PROCESSOR: Basic Macro processor Functions, Macro Definition and Expansion, Macro Processor Algorithm and Data Structures, Machine-Independent Macro Processor Features, Concatenation of Macro Parameters, Generation of Unique Labels, Conditional Macro Expansion, Keyword Macro Parameters, Macro Processor Design Options.(Chapters 3,4 of text book1)
U N I T – IV
COMPILERS: Compiler Functions: Grammars, Lexical Analysis, Syntactic Analysis, Code Generation, Machine-Dependent Compiler Features: Intermediate Form of the Program, Machine-Dependent Code Optimization, Machine-Independent Compiler Features: Structured Variables, Machine-Independent Code Optimization, Storage Allocation, Block-Structured Languages, Compiler Design Options: Division into Passes, Interpreters, P-Code compilers, Compiler-Compilers.(Chapters 4, 5 of text book 1)
TEXT-BOOK 1. SYSTEM SOFTWARE AN INTRODUCTION TO SYSTEMS PROGRAMMING -By LELAND L. BECK 2. ASSEMBLY LANGUAGE PROGRAMMING FOR THE IBM PC FAMILY- WILLIAM B JONES (DREAMTECH) REFERENCE BOOK:
1. SYSTEM SOFTWARE AND OPERATING SYSTEMS -By DHAMDHERE - TMH 2nd Edition SYSTEM PROGRAMMING - DONOVON
Dept. of Computer Science M.SC. (CSC) 2013-2014
U N I T - I MULTITHREADI
NG: Introduction, Class Thread: An Overview of the Thread Methods, Thread States: Life Cycle of a Thread, Thread Priorities and Thread Scheduling, Thread Synchronization, Producer/Consumer Relationship without Thread Synchronization, Producer/ConsumerRelationship withThread Synchronization, Producer / Consumer Relationship: The CircularBuffer, Daemon Threads, Runnable Interface, and Thread Groups. NETWORKING: Introduction, Manipulating URLs, Reading a File on a Web Server, Establishing a Simple Server, Establishing a Simple Client, Client/Server Interaction with Stream Socket Connections, Connectionless Client/Server Interaction with Datagram’s, Client/Server Tic-Tac-Toe Using a Multithreaded Server, Security and the Network.)
U N I T –II JDBC: JDBC Overview, Architecture, Types of JDBC Drivers, DriverManager; Database Connection Statements , ResultSet, transaction,DataBaseMetadata,ResultSetMetadata and Aggregate functions, PreparedStatement,CallableStatement, Connection to various back ends. New Features in the JDBC 2.0 /3.0 /4.0 API. RMI: Introduction, Defining the Remote Interface Implementing the Remote Interface, Define the Client, Compile and Execute the Server and the Client. Case Study on creating a distributed system with database programming.RMI Security. U N I T – III SERVLETS: Servlet Basics, Setting up Servlet API. Creating a Java Web Application, The Servlet URL and Invoking Web Page, Servlet Structure, Testing a Servlet, Passing Data. Overview of Serves, Interacting with Clients, Servlet Runner Utility, Running Servlets.WEB SERVERS: Server installation, configuration and deployment procedure. MORE ON SERVLETS: The javax.servelet HTTP package, Handling Http Request & Responses, Accessing a Database Data Manipulation Operations via a Servlet; Using Cookies-Session Tracking, Security Issues. U N I T – IV INTRODUCTION TO JSP: The Problem with Servelet. The Anatomy of a JSP Page, JSP Processing. JSP Application Design with MVC architecture’s APPLICATION DEVELOPMENT: Generating Dynamic Content, JSP Tags, Using Scripting Elements Implicit JSP Objects, JSP-Rationale behind JSP’s,compilation and execution,
collaborating with Servlets,JSP’s in Action, Error Pages, Using JSP’s to access databases and remote databases. TEXT-BOOK
1. AN INTRODUCTION TO NETWORK PROGRAMMING WITH JAVA, Jan Graba (Springer) 2. JAVA HOW TO PROGRAM Third Edition - Deitel&Deitel 3. THE JAVA TUTORIAL CONTINUED Compione, Walrath, Huml, Tutorial Team - Addison Wesley REFERENCE BOOKS 1. Java Server Pages –Hans Bergsten, SPD O’Reilly. 2. J2EE 1.4 Bible (Dreamtech-2003).
3.PROGRAMMING JAVA - DECKER&HIRSH FIELD VIKAS PUBLISKING (2001) (THOMSONLEARNING ) (SECOND EDITON) 4.INTRODUCTION TO JAVA PROGRAMMING - Y.DANIEL LIANG PHI(2002) 5.OBJECT ORIENTED PROGRAMMING THROUGH JAVA 2 BY - THAMUS WU (Mc.Graw Hill) 6.JAVA 2 - DIETEL & DIETEL (PEARSON EDUCATION) 7.INTRODUCTION TO JAVA - BALA GURU SWAMY 8.INTRODUCTION TO PROGRAMMIND & OOD USING JAVA - JAINO NINE & FA HOSCH(JOHNWILEY) 9.STARTING OUT WITH JAVA - JONY GADDIS (DREAM TECH PRESS)
MSCCS126 WEB TECHNOLOGIES LAB WTL
WORK LOAD: 4 PPW REVIEW ASSESSMENT
EXTERNAL MARKS: 50
MSCCS112 WEB TECHNOLOGIES WT
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
Programs are to be practiced on the basis of topics covered in corresponding theory paper.
MSCCS127 UNIX NETWORK PROGRAMMING LAB UNPL
WORK LOAD: 4 PPW REVIEW ASSESSMENT
EXTERNAL MARKS: 50
Programs Using UNIX or LINUX 1) Shell Programming 2) Simple Program using the commands - PS, Nohup, Wail, Kill, Nice, At, Batch, Cron, Sh,Cd, Empr etc. 3) File Locking & Record Locking 4) Pipes 5) Message Queues 6) FIFO 7) Semaphore 8) Client-Server example. 9) Shared memory 10)Socket Programming BOOK FOR REFERENCE: 1. UNIX THE C ODYSSEY - M. GANDHI, SHETTI, SHAH (BPB PUBLICATIONS) 2. UNIX NETWORK PROGRAMMING - W. RICHARD STEVENS
MSCCS128 INTERNET TECHNOLOGIES LAB ITL
WORK LOAD: 4 PPW REVIEW ASSESSMENT
EXTERNAL MARKS: 50
1. Create a simple HTML page which demonstrate all types of lists. 2. Create a letter head of your college using following styles
i. image as background
Dept. of Computer Science M.SC. (CSC) 2013-2014
ii. use header tags to format college name and address 3. Create a web page, which contains hyper links like fruits, flowers, animals.When you click on hyper links, it must take you to related web page, these web pages must contains with related images. 4. Create a hyperlink to move around within a single page rather than to load another page. 5. Create a leave letter using different text formatting tags. 6. Create a table format given bellow using row span and column span.
RNO NAME
Insert 5 records.
7. Create a table with different formats as given bellow. i. Give different background and font colors to table header, footer and body. ii. Use table caption tag.
8. Divide a web page vertically and horizontally with scroll bars, name them as shown bellow decorate it with some items. F1
8. Divide a web page as shown bellow.
9. Create a student Bio-Data, using forms. 10. Create a web page using following style sheets
i. Inline style sheets. ii. Embedded style sheets. iii. External style sheets
11. Create a web page using “class” style sheets with different “border-width” property values like thick, medium, thin, grove, inset, and outset, red & blue. 12.Accept marks from bellow form, calculate total and average, results must be shown in alert box.
13. Write a JavaScript program to accept name and index of name character from prompt box, convert name into uppercase and display name and index char in dialogbox.
14. Write a JavaScript program to accept two values from form and apply any 5 mathematicalfunctions.
15. Display the current date and time in both GMT and local form. 16. Write a JavaScript program on MouseOver, MouseOut, blur events. 17. Write a XML program using document type definitions 18. Write Student database with XML. 19. Write a XML program using XS PHP Programs
Dept. of Computer Science M.SC. (CSC) 2013-2014
1. Write a PHP program to Display “Hello” 2. Write a PHP Program to display the today’s date. 3. Write a PHP Program to read the employee details. 4. Write a PHP Program to display the 5. Write a PHP program to prepare the student marks list. 6. Write a PHP program to generate the multiplication of two matrices. 7. Write a PHP Application to perform demonstrate the college website. 8. Write a PHP application to add new Rows in a Table. 9. Write a PHP application to modify the Rows in a Table. 10. Write a PHP application to delete the Rows from a Table. 11. Write a PHP application to fetch the Rows in a Table. 12. Developan PHP application to make following Operations
i. Registration of Users. ii. Insert the details of the Users. iii. Modify the Details. iv. Transaction Maintenance. a) No of times Logged in b) Time Spent on each login. c) Restrict the user for three trials only.
d) Delete the user if he spent more than 100 Hrs of transaction. (All exercises from the text book must be practiced in addition to the above problems)
Dept. of Computer Science M.SC. (CSC) 2013-2014
KAKATIYA UNIVERSITY WARANGAL
DEPARTMENT OF COMPUTER SCIENCE
COURSE STRUCTURE FOR M.SC. (CSC) WITH EFFECT FROM 2013-14
M.SC. II YEAR I SEMESTER:
Paper No Paper Title/Subject Workload Per Week (Theory :
Lab)
Marks
Internal
External
Total
MSCCS211 ARTIFICAL INTELLIGENCE T(04) 20 80 100
MSCCS212 SOFTWARE ENGINERING T(04) 20 80 100
MSCCS213 .NET PROGRAMMING T(04) 20 80 100
MSCCS214 CRYPTOGRAPHY AND NET WORK SECURITY T(04) 20 80 100
MSCCS215 DATA WAREHOUSING AND MINING T(04) 20 80 100
MSCCS216 .NET PROGRAMMING LABORATORY L(04) -- 50 50
MSCCS217 Data Mining LABORATORY L(04) -- 50 50
MSCCS218 SOFT WARE ENGINEERIG LABORATORY L(04) -- 50 50
650
Dept. of Computer Science M.SC. (CSC) 2013-2014
U N I T - I
ARTIFICIAL INTELLIGENCE: ITS ROOTS AND SCOPE, AI: HISTORY AND APPLICATIONS : From
Eden to ENIAC: Attitudes toward Intelligence, Knowledge, and Human Artifice, Overview of AI
Application Area
ARTIFICIAL INTELLIGENCE AS REPRESENTATION AND SEARCH: Introduction, The Prepositional
Calculus, The Predicate Calculus, Using co Rules to Produce Predicate Calculus Expressions,
Application: A Logic-Based Financial Advisor. (Chapters 1 and 2) U N I T - II STRUCTURES AND STRATEGIES FOR STATE SPACE SEARCH:
Introduction, Graph Theory, Strategies for State Space Search, Using the State Space to
Represent Reasoning with the Predicate Calculus.
HEURISTIC SEARCH: Introduction, An Algorithm for Heuristic Search, Admissibility,
Monotonicity, and Informed ness, Using Heuristics in Games, Complexity Issues.
CONTROL AND IMPLEMENTATION OF STATE SPACE SEARCH: Introduction, Recursion-Based Search, Pattern-Directed Search, production Systems, The
Blackboard Architecture for Problem Solving. (Chapters 3, 4 and 5) U N I T - III REPRESENTATION AND INTELLIGENCE: THE AI CHALLENGE: KNOWLEDGE REPRESENTATION: Issues in Knowledge Representation, A Brief History of AI Representational Systems, Conceptual Graphs: A Network Language, Alternatives to Explicit Representation, Agent Based and Distributed Problem Solving. STRONG METHOD PROBLEM SOLVING: Introduction, Overview of Expert System Technology, Rule-Based Expert Systems, Model-Based, Case Based, and Hybrid Systems, Planning. (Chapters 6 and 7) U N I T - IV
REASONING IN UNCERTAIN SITUATIONS: Introduction, Logic-Based Abductive Inference,
Abduction: Alternatives to Logic, The Stochastic Approach to Uncertainty. (Chapter 8)
TEXT BOOK
1. ARTIFICIAL INTELLIGENCE By George F Luger, Pearson Education.
REFERENCE BOOKS :
1. ARTIFICIAL INTELLIGENCES ByRitch&Neight. 2. INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS By D.W. Patterson
(PHI-200)
3. ARTIFICIAL INTELLIGENCE By Patrick Henry Winston
4. PRINCIPLES OF ARTIFICIAL INTELLIGENCE (Narosa)
5. Artificial Intelligence ByShiartRussel Peter Novvig (PHI)
MSCCS211 ARTIFICIAL INTELLIGENCE AI
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
U N I T - I
INTRODUCTION TO SOFTWARE ENGINEERING: The Evolving Role of Software - Software - The
Changing Nature of Software - Software myths. A GENERIC VIEW OF PROCESS: Software
Engineering-A Layered technology - A Process frame work - The capability Maturity Model
Integration (CMMI) - Process Patterns - Process Assessment - Personal and Team Process Models -
process Technology - Product and Process. PROCESS MODELS: Prescriptive Models - The
waterfall Model - Incremental Process Models-Evolutionary Process Models - Specialized Process
Models - The Unified Process. (Chapters1,2and 3)
UNIT- II
SOFTWARE ENGINEERING PRACTICE: Software engineering Practice - Communication Practice-
Planning Practices - Modeling Practices - Construction Practice - deployment
SYSTEM ENGINEERING: Compute-Based systems - The System Engineering Hierarchy - Business
Process Engineering: An Overview - Product Engineering:An Overview - System
Modeling.REQUIRMENT ENGINEERING: A Bridge to Design and Construction - Requirements
EngineeringTasks - Initiating the Requirements Engineering Process - Eliciting Requirements-
Developing Use - Cases - Building the analysis Model - Negotiating Requirements - Validating
Requirements. BUILDING THE ANALYSIS MODEL: Requirements Analysis - Analysis Modeling
Approaches – Data Modeling Concepts-Object-oriented Analysis - Scenario-Based Modeling -
Flow-OrientedModeling - Class-Based Modeling - Creating a Behavioral Model. (Chapters 5, 6, 7, 8)
UNIT - III
DESIGN ENGINEERING: Design within the Context of Software Engineering - design Process andDesign Quality - Design Concepts - The Design Model - Pattern-Based Software Design.
CREATING AN ARCHITECTURAL DESIGN: Software Architecture - Data Design - Architectural
Styles and Patterns - Architectural Design- Assessing Alternative Architectural Designs -
Mapping Data Flow into Software Architecture. MODELING COMPONENT-LEVEL DESIGN: What is a Component? - Designing Class-Based Component-Level Design - Object Constraint Language - designing Conventional Components. (Chapters 9, 10 and 11)
UNIT - IV PERFORMING USER INTERFACE DESIGN: The Golden Rules - User Interface Analysis and Design- Interface Analysis - Interface Design Steps - Design Evaluation.RISK MANAGEMENT: Reactive vs. Proactive Risk Strategies - Software Risks - Risk Identification - Risk Projection - Risk Refinement - Risk Mitigation, Monitoring, and Management - The RMMM Plan.QUALITY MANAGEMENT: Quality Concepts - Software Quality Assurance - Software Reviews -Formal Technical Reviews - Formal Approaches to SQA - Statistical Software Quality Assurance -Software Reliability - The ISO 9000 Quality Standards - The SQA Plan. (Chapters 12, 25, 26)
TEXT BOOK:
1. SOFTWARE ENGINEERING BY R.S. PRESSMAN (Mc. Graw Hill Sixth Edition)
REFERENCE BOOKS:
1. SOFTWARE ENGINEERING BY GHEZZI (PHI)
2. SOFTWARE ENGINEERING FUNDAMENTALS BY BEHFOROOZ AND HUDSON OXFORDUNIVERSITY PRESS
3. SOFTWARE ENGINEERING BY FAIRLEY (Mc.Graw Hill)
MSCCS212 SOFTWARE ENGINEERING SE
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
UNIT - I
Fundamentals of Visual Basic, Exception handling, windows forms, Control Classes, Different
Types of Boxes, Labels, Buttons, Panels. (Chapters 1 to 7)
UNIT - II
WINDOWS FORMS: Different types of Bars, Menus, Views. OBJECT - ORIENTED PROGRAMMING: Classes and objects constructors and destructors,
inheritance, modifiers, Interfaces, Polymorphism, Vate Binding, Graphics handling and File
handling. (Chapters 8 to 13)
UNIT - III
WEB FORMS: Working with web forms, Web forms and HTML, The Web control class, Web Forms
and Boxes, Web Forms and Buttons, Validation Controls, Ad Rotators, Web Forms and HTML
controls. (Chapters 14 to 19)
UNIT - IV
DATA ACCESS WITH ADO.NET : Accessing data with the server explorer, Data adapters and
Data sets, Binding Controls to databases, Handling databases in code, Database access in
Web Applications. Creating user Controls, Webuser Controls, and Multithreading creating
Windows services, Web Services and Deploying applications. (Chapters 20 to 25)
TEXT BOOK:
1. VB.NET PROGRAMMING (BLACK BOOK) BY STEVEN HOLZNER (Dreamtech- 2003) REFERENCE
REFERENCE BOOKS:
1. VB.NET PROGRAMMING BY T. GADDIS (Dreamtech)
2. Microsoft Visual Basic. Net step by step By Halvosrson (PHI)
3. OOP with Microsoft Visual Basic.Net ByReynoldHacrtte (PHI)
MSCCS213 .NET PROGRAMMING .NET
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
U N I T - I
INTRODUCTION:- Attacks, Services, and Mechanisms, Security Services. CONVENTIONAL ENCRYPTION: CLASSICAL TECHNIQUES: Steganography, Classical Encryption Techniques.
CONVENTIONAL ENCRYPTION: MODERN TECHNIQUES:- Simplified DES. The Data Encryption
Standard, Differential and Linear Cryptanalysis, Block Cipher Modes of Operation.
U N I T - II
CONFIDENTIALITY USING CONVENTIONAL ENCRYPTION:- Traffic Confidentiality, Random Number
Generation. PUBLIC-KEY CRPTOGRAPHY:- Principles of Public-Key Cryptosystems, The RSA
Algorithm, DiffieHellman Key Exchange, Elliptic Curve Cryptography. INTRODUCTION TO
NUMBER THEORY:- Prime and Relatively Prime Numbers, Fermat's and Euler's Theorem,
Euclid's Algorithm, The Chinese Remainder Theorem, Discrete Logarithms.
U N I T - III
MESSAGE AUTHENTICATION AND HASHFUNCTIONS:- AuthenticationRequirements,
Authentication Functions, Message Authentication Codes, Hash Functions, Security of Hash
Functions and MACs. DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS:- Digital
Signatures, Authentication Protocols, Digital Signature Standard.
U N I T - IV
ELECTRONIC MAIL SECURITY: S/MIME. IP SECURITY: IP Security Overview, IP Security Architecture, Encapsulating Security Payload, Key Management. FIREWALLS: Firewall Design Principles, Trusted Systems. (Chapters 1,2,4,5,6,7,8,10,12,13 and 16)
TEXT BOOK:
1. CRYPTOGRAPHY AND NETWORK SECURITY principles and Practice FOURTH Edition By William Stallings (Pearson Asia)
REFERENCE BOOKS:
1. DAVIES &PRICE: SECURITY FOR COMPUTER NETWORKS - Wiley (1984)
2. MAYER &MATYAS: CRYPTOGRAPHY - Wiley B. SCHNEIER: APPLIED CRYPTOGRAPHY -(John Wiley)
MSCCS214 CRPTOGRAPHY AND NETWORK SECURITY CNS
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
UNIT-I
What is Data Mining, Data Mining Functionalities, and classification, Data Mining Task,
Integrating a Data Mining System, Major issues in Data Mining, Descriptive Data
Summarization, and Data Cleaning. (Chapters 1,2.1 to 2.3)
UNIT-II
Data Integration and transformation, Data reduction, Data Discrimination and concept Hierarchy
Generation. What is Data Warehouse, Multidimensional Data Model, Data Warehouse
Architecture, Data Warehouse Complementation, From Data Warehouse to data mining. (Chapters
2.4 to 2.6, 3)
UNIT-III
Basic Concepts of frequent patterns, Frequent Item sets, mining methods, Association rules, what is
classification and Prediction, Classification By Decision Tree Induction, Bayesian Classification,
Rule-
Based Classification. (Chapters 5.1, 5.2.1, 5.2.2, 5.3.1, 6.1, 6.2, 6.3.1, 6.3.3, 6.4.1, 6.4.2, 6.5.1
6.5.2) U N I T - IV
What is Cluster analysis, types, Partitioning methods, Hierarchical methods, Density Based
methods, Grid Based methods, and Model-Based Clustering methods, Outlier analysis? (Chapters 7.1 to 7.8 and 7.11)
TEXT BOOK:
1. DATA MINING CONCEPTS & TECHINIQUES BY JIAEEI HAN, MICHELINE & KAMBER (2nd
EDITION) Harcourt India (Elsevier Publishing Company)
REFERENCE BOOKS: 1. Data Mining Introductory and advanced topics-MARGARET H DUNHAM, PEARSON EDUCATION 2.Data Mining Techniques - ARUN K PUJARI, University Press. 3.Data Warehousing in the Real World - SAM ANAHORY &DENNIS MURRAY. Pearson Edn Asia. 4.Data Warehousing Fundamentals - PAULRAJ PONNAIAH WILEY STUDENT EDITION 5.DATA WAREHOUSING, DATA MINING & OLAP BY ALEX BERSON AND STEPHEN J. SMITH (TMH)
MSCCS215 DATA WAREHOUSE AND DATA MINING DMW
WORK LOAD: 4 PPW INTERNAL MARKS: 20 EXTERNAL MARKS: 80
Dept. of Computer Science M.SC. (CSC) 2013-2014
• The concepts covered in the corresponding theory paper are to be implemented.
Weka is a collection of machine learning algorithms for data mining tasks. The algorithms can
either be applied directly to a datasets#. Weka contains tools for data pre-processing,
classification, regression, clustering, association rules, and visualization.
Launching WEKA, COMMAND-LINE(simple CLI), EXPLORER-User Interface, Preprocessing,
Classification, Clustering, Associating, Selecting Attributes, Visualizing; EXPERIMENTER-Simple,
Advanced; KNOWLEDGEFLOW-Introduction, Features, Components; ArffViewer; Converters;etc.,
RESOURCES:
Manuals and Software:
http://www.cs.waikato.ac.nz/ml/weka/index.html
Collections of Datasets:
# http://www.cs.waikato.ac.nz/ml/weka/datasets.html
MSCCS216 .NET LAB .NETL
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
MSCCS217 DATA MINING Laboratory DML
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
Dept. of Computer Science M.SC. (CSC) 2013-2014
SOFTWARE TESTING – Introduction, purpose of testing, Dichotomies, model for testing, consequences of bugs, taxonomy of bugs. Basics concepts of path testing, predicates, path predicates and achievable paths, path sensitizing, path instrumentation, application of path testing.
UML: Importance of modeling, principles of modeling, object oriented modeling, conceptual model
of the UML, Architecture, Software Development Life Cycle. Basic Structural Modeling: Classes,
Relationships, Class & Object Diagrams. Interactions, Interaction diagrams, Use cases, Use case
Diagrams, Activity Diagrams, Component, Deployment, Component diagrams and Deployment
diagrams; Caste Study on Unified Library Application(ULA).
# To learn and use the testing tools to carry out the functional testing, load/stress testing and use
the following (or similar) automated testing tools to automate testing:
a) Win Runner/QTP for functional testing.
b) Load Runner for Load/Stress testing.
c) Test Director for test management.
List of Sample Programs /Experiments
1. The student should take up the case study of Unified Library Application (ULA) which is
mentioned in the theory, and Model it in different views i.e Use case view, logical view, component
view, Deployment view, Database design, forward and Reverse Engineering, and Generation of
documentation of the project.
2. Student has to take up another case study of his/her own interest and do the same what ever
mentioned in first problem. Some of the ideas regarding case studies are given in reference books
which were mentioned and it would be referred for some new idea.
REFERENCE BOOKS:
1. Software Testing Tools – Dr.K.V.K.K.Prasad, Dreamtech
2. Software Testing Concepts and Tools, P.Nageswara Rao, Dreamtech Press.
3. Grady Booch, James Rumbaugh, Ivan Jacobson : The Unified Modeling Language User Guide, Pearson Education 2nd Edition
MSCCS2188 SOFTWARE TESTING LABOTORY STL
WORK LOAD: 4 PPW REVIEW ASSESSMENT EXTERNAL MARKS: 50
Dept. of Computer Science M.SC. (CSC) 2013-2014
KAKATIYA UNIVERSITY WARANGAL
DEPARTMENT OF COMPUTER SCIENCE
COURSE STRUCTURE FOR M.SC. (CSC) WITH EFFECT FROM 2013-14
M.SC II YEAR II SEMESTER:
The Project work constitutes a major component in most professional programmes. It needs to be carried out with due care, and should be executed with seriousness by the students. The project work is not only a partial fulfilment of the MSC requirements, but also provide a mechanism to demonstrate ASK (Attitude, Skills, and Knowledge) with specialisation. The project work should compulsorily include the software development. Physical installations/configuring of LAN/WAN or theoretical projects or study of the systems, which doesn’t involve s/w development, ARE STRICTLY NOT ALLOWED. The students are expected to work on a real-life project preferably in some industry/ R&D Laboratories / Educational Institution / Software Company. Students are encouraged to work in their interested area. The student can formulate a project problem with the help of his / her Guide of the concerned college. APPROVAL OF THE PROJECT PROPOSAL IS MANDATORY by his/her Guide. If approved, the student can commence working on it, and complete it. Use the latest versions of the software packages for the development of the project. Project problem domain selected and the specifications should be genuine.
MSCCS221 MAJOR PROJECT WORK MPW
WORK LOAD: REVIEW ASSESSMENT EXTERNAL MARKS: 150